Hard drive or full disk encryption explained (2024)

Encryption is another name for encoding and hard drive or full disk encryption (FDE) means the encoding of every piece of data available on a hard drive, whether it is the old SATA drives or the relatively new SSD.

The only piece of data that might not be encrypted by default while performing full disk encryption is the operating system. But now, even operating system files can be encrypted by default.

To clarify what encryption or encoding means, it is the process of turning something, data in this case, meaningful, into something gibberish based on a key, meaning that the data would be useless without the key. The data can be converted to the original form only with this key.

Table of Contents

  • Types of full disk encryption
  • Software encryption
  • Hardware encryption
  • Why should you go for a hard drive or full disk encryption?
  • How does FDE work?
  • BitLocker
  • FileVault
  • Why FDE might not be the sole answer to data protection on devices
  • Best practices while performing full disk encryption

Types of full disk encryption

There are mainly 2 kinds of full disk encryptions:

Software encryption

As the name suggests, the whole encryption is done by software. Some examples are BitLocker by Microsoft and FileVault by Apple. Encryption tools like these, when enabled, encrypt data as it gets stored to a device.

Software encryption is mostly based on a password/passphrase. Only the password/passphrase can decrypt the data.

Both the encryption and decryption processes happen automatically. When data gets written to the encryption-enabled disk it is scrambled automatically at that instant. The same happens when data on the disk is accessed, the data is automatically decrypted as it is read from the disk.

Pros

  • Software-based encryption is normally cheap and companies like Apple and Microsoft provide in-built tools for the process.
  • Software-based encryption is also very easy to implement. It does not require any other external resources.

Cons

  • Software-based encryption generally takes its toll on the processor. Software encryption can slow down your device considerably. Accessing encrypted files might not happen as quickly as accessing normal files.
  • Another major drawback of this is that if a person gets hold of the password, then the whole encryption process can be undone.

Hardware encryption

Here a separate processor is responsible for the entire encryption process. Here also the encryption is based on a key, but this key is randomly generated by the processor.

Keys are often a bit hard to remember, so in some cases, the key can be attached to a biometric lock, like a fingerprint lock or even a pin.

Pros

  • The whole process is much safer compared to the software encryption process. This is because the whole process is done by a separate processor, which is not linked to the rest of the system.
  • Another main advantage of this is that this process happens much faster and doesn’t exert any extra load on the device processor.

Cons

  • The main disadvantage is that most of the hardware-based encryption techniques are expensive compared to software encryptions.
  • Another disadvantage with this technique is that if there is a problem with the external processor, it might become a very hard task to recover the data.

Why should you go for a hard drive or full disk encryption?

All kinds of valuable and sensitive data get accessed from devices. And when it comes to corporate devices, if the device gets into the wrong hands, the result would be devastating. If a work device gets lost or stolen, there is a high chance that unwanted personnel might get hold of your sensitive corporate data.

So, organizations should take every measure possible to prevent the loss of data even if devices are lost, and full drive encryption might be the first thing that can be done in this aspect. Encryption can ensure one thing, even if unwanted people get hold of a device, the data in it would be useless without the password.

If a non-encrypted device gets stolen or lost, it is very easy to recover the data even if the device is password protected. Just put the drive in a new device, and the data in it can be accessed.

Full disk encryption is designed in such a way that when enabled, every piece of data that gets stored on the drive gets automatically encrypted. Once the device is locked, the data in it can be accessed only using the key/password.

How does FDE work?

So, we saw what full disk encryption is, why it is useful and why it is not enough on its own to protect your data. Now let’s get an idea on FDE works.

Tools like BitLocker and FileVault help in FDE. Full disk encryption happens in such a way that the data in a drive is first split into blocks of fixed sizes like 128-bit or 256-bit.

After the data is separated into blocks, the data is then scrambled into gibberish based on a key of fixed data length like 128-bit or 256-bit or 512-bit.

Encryptions are normally based on algorithms and each algorithm has a different combination of key length and block size. AES and DES are some of the most common algorithms out there.

AES and DES algorithms

AES is the abbreviation for Advanced Encryption Standard. AES is also known as Rijndael, a name derived from the names of the cryptologists who found this encryption method, Joan Daemen and Vincent Rijmen.

AES is an algorithm that uses a fixed block size of 128-bit. But the key size here can be 128-bit, 192-bit or 256-bit. AES is a symmetric block cipher, meaning it uses the same key for the encryption and decryption process.

Another common but older algorithm used is DES or Data Encryption Standard. DES method has a block size of 64-bit and a key length of 64-bit. But the thing with the key length is only 56-bit is effective, 8-bit is used as check bits. DES is also symmetric like the AES algorithm.


For ease, the encryption key can be associated with a password/passphrase. But the thing with this is that you have to take care of the password with extra care because if a hacker gets it the data is very vulnerable.

BitLocker

BitLocker is the encryption tool that is provided by Microsoft for Windows devices. Using BitLocker, entire disk volumes can be encrypted very easily on Windows devices.

BitLocker uses an AES algorithm associated with CBC or cipher block chaining or XTS mode. Here there is an option of choosing a 128-bit key or a 256-bit key.

With the help of a UEM like Hexnode, BitLocker can be configured on work devices of employees remotely. By remotely setting up BitLocker you can tighten your company’s data without causing any hassle to the employees.

Hard drive or full disk encryption explained (1)

Featured resource

Hexnode Windows Management Solution

Get started with Hexnode’s Windows Management solution to improve security, increase productivity, save time and overhead costs of managing your corporate devices.

Download datasheet

FileVault

FileVault is the full disk encryption tool introduced by Apple for macOS devices. FileVault is similar to BitLocker in the aspect of the algorithm used. FileVault also uses an AES-XTS algorithm with a block size of 128-bit and a key size of 256-bit.

Remote configuration of FileVault setting is also possible with UEMs like Hexnode. Even though configuring FileVault settings is easy, it becomes a very hard task when you have to configure it for 100 devices. Hexnode can help you remotely set up FileVault for multiple devices easily.

Why FDE might not be the sole answer to data protection on devices

Though FDE can encode the entire data on a drive, FDE on its own cannot ensure that all data on a device is 100% protected. Wouldn’t it have been easy if it was the one solution to all your data protection issues?

The main drawback with full disk encryption is that it can ensure data security only when the device is at rest. This means that the data is encrypted only when the device is locked. When the device is unlocked, anyone can open and access any files in the device.

The entire encryption/decryption is based on a single key/password. Since it is so valuable, it must be stored securely. If the key is lost, then it is very hard to recover the data.

Another issue is that if an unwanted person gets hold of the key, then the whole device is again compromised, and that person can get access to every piece of data on that disk.

Sign up for a free trial

Sign up for a free 14-day trial of Hexnode, your one-stop shop for corporate data protection.

Sign up

Best practices while performing full disk encryption

Before you enable full disk encryption, make sure that you have understood all the complications involved with the process. Make sure that hard drive encryption is something you absolutely require for the devices used in your organization.

Back up the data somewhere safe and secure. This is recommended so that even if you happen to lose the encryption key/password, it is easy for you to get back to work very easily. But this practice is considered unsafe.

Make sure that you don’t lose the encryption key/password. The recovery process is very difficult if the key/password is lost, sometimes even impossible.

Always enforce strong password standards for user devices, even if the devices are encrypted. Also, make sure that screen idle lock is enabled on devices, as unattended and unlocked devices can be accessed by anyone.

When it comes to configuring full disk encryption for multiple devices enrolled under an organization, the best course of action is to do it through a UEM. Most of the UEMs today allow you to configure settings for in-built FDEs like FileVault and BitLocker.

Using a UEM remote setting up of FDE is possible. By doing so, the user is completely untroubled and doesn’t have to do the entire process on their own.

Hard drive or full disk encryption explained (2024)

FAQs

What is a hard drive that uses full disk encryption? ›

Full Disk Encryption (FDE) or whole disk encryption protects the entire volume and all files on the drive against unauthorized access. In contrast to FDE, File-Level Encryption (FLE) is an encryption method, which takes place on the file system level, enabling the encryption of data in individual files and directories.

Is full disk encryption enough? ›

Full Disk Encryption does indeed protect everything on a storage device, including the OS, user files, and any type of data therein without the user having to think about what to encrypt. But, that protection exists only when the machine is turned off and the FDE encryption key is not present.

What is the difference between disk and drive encryption? ›

File Encryption: Encrypts individual files or folders with a unique key for each file. Disk Encryption: Encrypts the entire disk, including the operating system and all files with a single key. SCOPE: File Encryption: Encrypts specific files or folders selected by the user with granular control.

What is the explanation on how the full drive encryption protects the sensitive data? ›

Whole disk encryption encrypts the entire disk including swap files, system files, and hibernation files. If an encrypted disk is lost, stolen, or placed into another computer, the encrypted state of the drive remains unchanged, and only an authorized user can access its contents.

Does encrypting a hard drive delete everything? ›

Encrypting a disk will not remove any existing data, but it's crucial to back up your data before proceeding, as encryption issues or password loss could potentially lead to data loss.

What does it mean when a disk is being encrypted? ›

Encrypted hard drives utilize two encryption keys on the device to control the locking and unlocking of data on the drive. These encryption keys are the Data Encryption Key (DEK) and the Authentication Key (AK): the Data Encryption Key is used to encrypt all the data on the drive.

What are the downsides of full-disk encryption? ›

Drawbacks of full-disk encryption

If users forget their password and lose their recovery key, the device will be inaccessible to them, and they will be locked out just like an intruder. Data in transit isn't protected, so data shared between devices and through email is still vulnerable to hacking.

What is the strongest disk encryption? ›

A Guide to Hardware-Based Encryption

For good reason, AES is considered the gold standard in drive encryption. Even the standard 256-bit AES encryption (which uses a 256-bit key) is essentially uncrackable.

Can full-disk encryption be cracked? ›

So an encrypted hard disk could be cracked only if: the user has a weak enough password to brute force, or. the encryption uses a weak algorithm.

Does encrypting a drive slow it down? ›

Because the encryption method uses the drive, rather than the CPU, there is no slow down in performance. The Crucial® MX-series SSDs have a 256-bit AES encryption controller. It's simple to swap out a hard drive or existing solid state drive for an SSD with better data security.

Does disk encryption slow down your PC? ›

When a disk is encrypted, the computer needs to encrypt and decrypt data on-the-fly. This extra step can slow down how quickly the system reads and writes data.

Is it safe to use disk encryption? ›

Chiropractic adjustment is safe when it's performed by someone trained and licensed to deliver chiropractic care. Serious complications associated with chiropractic adjustment are overall rare, but may include: A herniated disk or a worsening of an existing disk herniation.

What are the benefits of disk encryption of a drive? ›

Disk encryption software helps eliminate the risk of data leaks. For example, if a hard drive or laptop were to go missing, disk encryption would help ensure someone couldn't read the sensitive data stored on the device.

How long does it take to encrypt a hard drive? ›

How long will the encryption take? The length of time will depend on the size and speed of the hard drive in your computer. In our testing, the process has taken anywhere from 20 minutes to three hours.

Does full disk encryption affect performance? ›

Over the years we have noticed Encryption adversely affecting system performance - primarily in the read and write speeds. With some hard drives, this has been up to a 70% drop in speed. We see this on SSD's and NVMEs'.

Is BitLocker a full disk encryption? ›

BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices.

What is an example of disk encryption? ›

For example, BitLocker Drive Encryption leaves an unencrypted volume to boot from, while the volume containing the operating system is fully encrypted. With full disk encryption, the decision of which individual files to encrypt is not left up to users' discretion.

How do I get full disk encryption? ›

Turn on device encryption
  1. Sign in to Windows with an administrator account (you may have to sign out and back in to switch accounts). For more info, see Create a local or administrator account in Windows.
  2. Select Start > Settings > Privacy & security > Device encryption. ...
  3. If Device encryption is turned off, turn it On.

Can any hard drive be encrypted? ›

Anyone with an external hard drive has several options to encrypt it, most of which do not entail an additional cost. Mac, Windows and Linux have built-in encryption software, and plenty of third-party options are available. This guide will show you encrypt external hard drive options to protect your data.

Top Articles
Latest Posts
Article information

Author: Kieth Sipes

Last Updated:

Views: 5500

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Kieth Sipes

Birthday: 2001-04-14

Address: Suite 492 62479 Champlin Loop, South Catrice, MS 57271

Phone: +9663362133320

Job: District Sales Analyst

Hobby: Digital arts, Dance, Ghost hunting, Worldbuilding, Kayaking, Table tennis, 3D printing

Introduction: My name is Kieth Sipes, I am a zany, rich, courageous, powerful, faithful, jolly, excited person who loves writing and wants to share my knowledge and understanding with you.